The Implications of AI in Digital Marketing
The Implications of AI in Digital Marketing
5 Steps to Creating Successful Ads

OffSec TH-200 (OSTH) Threat Hunter Online 90 days (QAOSTH90) [Video]

Categories
Integrated Solutions Offering

Topics covered in the Threat Hunting Course (TH-200)

  • Threat Hunting Concepts and Practices

This module provides an overview of the basic objectives, concepts and practices of cyber threat hunting. It covers how enterprises implement threat hunting and the different stages and types of threat hunts.

  • Threat Actor Landscape Overview

This module provides an overview of different types of threat actors with an emphasis on ransomware actors and Advanced Persistent Threats (APTs). It includes a number of more in-depth discussions of well-known threat actors.

  • Communication and Reporting for Threat Hunters

This module introduces the way in which threat hunters receive and use threat intelligence and create threat reports. It covers the concept of the Traffic Light Protocol but does not cover IoCs.

  • Hunting with Network Data

This module explores using Network Indicators of Compromise (IoCs) for proactive threat hunting. It highlights the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), like Suricata, in monitoring for suspicious activities. Practical methods to identify signs of compromise in …

How to Reach your Market in a World Ruled by Generative AI
How to Reach your Market in a World Ruled by Generative AI
12 Steps to Create Videos